|Publication number||US7603356 B2|
|Application number||US 09/820,054|
|Publication date||Oct 13, 2009|
|Filing date||Mar 28, 2001|
|Priority date||Jan 26, 2001|
|Also published as||US8073853, US8631045, US20020143770, US20100023999, US20120042009, US20140196153|
|Publication number||09820054, 820054, US 7603356 B2, US 7603356B2, US-B2-7603356, US7603356 B2, US7603356B2|
|Inventors||Adam R. Schran, Robert E. Darlington|
|Original Assignee||Ascentive Llc|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (23), Non-Patent Citations (12), Referenced by (4), Classifications (6), Legal Events (3)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This application claims the benefit of U.S. Provisional Application No. 60/264,382 filed Jan. 26, 2001, entitled “SYSTEM AND METHOD FOR NETWORK ADMINISTRATION AND LOCAL ADMINISTRATION OF PRIVACY PROTECTION CRITERIA.”
The interactive nature of the World Wide Web has proved to be a powerful marketing tool, allowing businesses and consumers to communicate on a one-to-one basis. A cookie file (also know simply as a “cookie”) is a tool used on the web to facilitate and interpret this one-to-one interaction. Cookie files offer businesses the potential for more effective direct marketing of goods, services and information. For many e-businesses that operate over the Internet, cookie files are considered to be vital to the future success of on-line advertising and thus the generation of future business.
A cookie file is a small file that is stored on an individual's computer. The cookie file allows a website to tag the browser of the individual's computer with a unique identification. When the individual visits the website, a server at the website requests a unique identifier from the browser of the individual's computer. If the unique identifier is not received, the server delivers one, in the form of a cookie file, to the individual's computer, where it is stored for future access by that particular server.
Many cookie files used by on-line business actually benefit on-line computer users, such as by providing easy access to a website that an on-line computer user desires to interface with on a regular basis. Cookie files may be used by advertisers to avoid repeatedly showing the same advertisement (e.g., a banner) to the same on-line computer user. Additionally, cookie files make it easy for consumers to shop on their favorite websites. Once a consumer returns to a previously visited website where he or she purchased one or more items, the consumer can conveniently purchase additional items without having to re-enter his or her credit card number or shipping address, assuming that the consumer is using the same computer and a cookie file was stored in it during the consumer's first visit.
Cookie files are also used to track information about an on-line computer user's behavior. It is believed by many that cookie files invade a computer user's privacy because they reveal the user's identity and link it to the user's history of Internet usage. Thus, a cookie file may be used as a tool of surveillance by monitoring the computer user's browser and revealing website addresses that the computer user visits to the entity that “planted” the cookie file. Additionally, businesses that receive information obtained from using cookie files may share such information with other businesses. Thus a privacy issue may arise due to companies that abuse the technology of using cookie files. When linked to tracking databases, the storage of cookie files may reveal a particular person's most private information, such as their medical or financial history. Some companies further extend the privacy threat by cross-referencing cookie file identifiers with massive off-line marketing databases.
Several software programs have been developed and are on the market for the purpose of screening cookie files. Internet Explorer and Netscape allow a computer user to set the computer's browser such that all received cookie files are either automatically accepted (enabled) or rejected (disabled). In another user selectable browser mode, the computer user is prompted for a decision every time an individual cookie file is received.
There are software programs that let users create a profile of which types of cookie files they will accept. However, there is no guarantee that cookie files generated by companies with a history of abusing the use of cookie files will be screened out, nor is there a universal reference source for determining which cookie file sources should not be accepted. What is needed is a professional service that constantly researches and evaluates cookie file sources (e.g., websites), cookie files, consumer complaints and other statistical data, and develops and electronically distributes to subscribing computer users, on a periodic basis, a list of those cookie file sources that the service recommends should not be permitted to store cookie files in the subscribing user's computer. What is also needed is a user-friendly interface for enabling a user to easily and automatically modify the distributed list once it is received by the user's computer, such that the user may customize the list to meet his or her individual or organizational requirements.
The present invention allows a user to screen cookie files to determine which cookie files should be stored in the user's client machine (e.g., computer) based on the professional recommendations of a service provider. Through a user-friendly interface, the user is able to modify the recommendations of the service provider as desired, by creating one or more exception lists. The exception lists indicate specific cookie file sources that the user has designated as being allowed or not being allowed to be stored in the user's client machine. A composite list is generated as a result of modifying the service provider's recommendations according to the user's exception lists. The composite list is used to determine which cookie files already stored in the client machine may remain and which should removed.
A method of screening cookie files in a client machine in accordance with the present invention is now described. A server of a service provider that makes professional recommendations regarding the handling of cookie files receives a request to send a list of cookie file sources to the client machine. The request is received from an individual (a “subscriber”) subscribing to services provided by the service provider. The individual is a user of the client machine. In response to the request, the server downloads the list of cookie file sources to the client machine. The downloaded list is used to detect cookie files received at the client machine from sources on the downloaded list.
A first exception list may be created by the subscriber to include the identity of sources that are permitted to store cookie files in the client machine. The sources in the first exception list may or may not be included on the downloaded list. A second exception list may also be created to include the identity of sources that are not permitted to store cookie files in the client machine. The sources in the second exception list may or may not be included on the downloaded list. The professional service provider creates the downloaded list. The subscriber creates the first and second exception lists. The downloaded list may then be modified in accordance with the first and second exception lists where any cookie file. A separate composite list may be generated instead of modifying the downloaded list. The composite list may include the cookie file sources on the downloaded list, plus any cookie file sources on the first exception list, minus any cookie file sources on the second exception list that also appear on the downloaded list. Updates of the downloaded list may be received from the server on a periodic basis. Once the downloaded list is modified or a composite list is generated, the client machine may display a message indicating that a cookie file received from a source on the downloaded list has been detected. Detected cookie files stored in the client machine may be removed. Detected cookie files may be prevented from being stored in the client machine.
In an embodiment of the present invention, a first method of creating a composite list of cookie file sources in a client machine is now described. A first exception list is created. The first exception list includes the identity of sources that are permitted to store cookie files in the client machine. A second exception list is also created. The second exception list includes the identity of sources that are not permitted to store cookie files in the client machine. A master list of cookie file sources is received at the client machine from a service provider that makes professional recommendations regarding the handling of cookie files. The master list is then modified in accordance with the first and second exception lists. Thus, the composite list is the modified master list. Updates of the master list may be received from the service provider on a periodic basis. Stored cookie files received at the client machine from sources on the composite list may be removed. Cookie files received at the client machine from sources on the composite list may be prevented from being stored in the client machine.
In another embodiment of the present invention, a second method of creating a composite list of cookie file sources in a client machine is now described. A master list of cookie file sources is received at the client machine from a service provider that makes professional recommendations regarding the handling of cookie files. Cookie file sources from the master list that correspond to one or more trusted cookie file sources listed in the client machine are deleted. Cookie file sources that correspond to one or more untrusted cookie file sources listed in the client machine are added to the master list. Cookie files stored in the client machine and which are received from sources on the composite list may be removed. Cookie files received at the client machine from sources on the composite list are prevented from being stored in the client machine.
The following detailed description of preferred embodiments of the present invention would be better understood when read in conjunction with the appended drawings. For the purpose of illustrating the present invention, there are shown in the drawings embodiments which are presently preferred. However, the present invention is not limited to the precise arrangements and instrumentalities shown. In the drawings:
Certain terminology is used herein for convenience only and is not to be taken as a limitation on the present invention. A “watchlist” or “watch list” or “master list” (hereinafter, “watch list”) is a list containing privacy protection criteria (e.g., a list of cookie file sources that are not trusted as designated by the service provider) that is downloaded to a client machine from a server of a service provider that provides professional recommendations. A “trust list” or “trustlist” or “first exception list” or “personal trustlist” (hereafter, “trustlist”), also contains exemptions to the privacy protection criteria included in the watch list (e.g., a list of cookie file sources that are trusted as designated by the user of the client machine). A “black list” or “blacklist” or “second exception list” or “personal blacklist” (hereafter, “blacklist”), contains exemptions to the privacy protection criteria included in the watch list (e.g., a list of cookie file sources that are not trusted as designated by a user of the client machine). The criteria contained in the watch list is generated by the service provider. The criteria in the blacklist and trustlist is generated by the user of the client machine. Criteria in the blacklist and trustlist supercede the criteria in the watch list. A “composite list” (a modified version of the watch list) contains privacy protection criteria which is stored in the client machine. The composite list is created by subtracting exemptions on the trustlist (if any) from the criteria on the watch list and adding the remaining criteria to the exemptions on the blacklist (if any). A “cookie file source” is a website, an e-business or any other entity that sends cookie files. A “client machine” is an apparatus which generally works directly for users, providing computational power and other “general purpose” tools. A client machine also provides one or more users with access to stored files. A computer is an example of a client machine.
As shown in
Three main objects are used by the present invention: the watch list 12, the trustlist 16 and the blacklist 18. The watch list 12 is essentially a managed security list containing privacy protection criteria which is stored on the server 10. A local copy of the watch list 14 is distributed to the client machine 20 via a subscription process. The trustlist 16 and blacklist 18 are maintained by the user on the client machine. Each of these three lists is made up of one or more uniform resource locators (URLs) which are used as privacy protection criteria. The client machine's software contains the user managed privacy data preferences and retrieves the managed watch list 12 from the server 10. The privacy data referenced above can take several forms, most commonly that of a web site, URL, or other cookie blocking or accepting criteria. The privacy data may take the form of a list of web sites for which the local storage of cookie files in the client machine is to be prohibited. The state management protocol of a cookie file may store unique or identifying information about the user, the user's session or the users' Internet account.
The watch list 12 is a compilation of privacy protection criteria distributed to the client machine 20 from a central privacy server 10 over a network. The watch list 12 may include Internet sites, which may use cookie files to store unique or identifying information about the client machine software user. The watch list 12 is maintained by a service provider and stored on an Internet accessible hypertext transfer protocol (HTTP) server 10.
The trustlist 16 is a list of exemptions to the privacy protection criteria, which may or may not be included in the local copy of the watch list 14. The trustlist 16 may include Internet sites, which may use cookie files to store unique or identifying information about the client machine user. The trustlist is customized and maintained by the client machine user. It contains those Internet sites that the user trusts, and those sites are allowed to download their cookie files to the user's client machine.
The blacklist 18 is a locally maintained list of privacy protection criteria to be merged with the local copy of the watch list 14. The blacklist 18 may include those Internet sites that should be blocked from creating cookie files to store unique or identifying information about the client machine software user. Like the trustlist 16, the blacklist 18 may also be customized and maintained by the client machine user. The blacklist 18 may include those Internet sites that the user does not trust, and the cookie files from those sites are removed from the user's client machine.
In one preferred embodiment of the present invention, the composite list may be a combination of the local copy of the watch list 14, the trustlist 16 and the blacklist 18. The composite list begins with the same contents as the local copy of the watch list 14. Any privacy protection exemptions contained on the trustlist 16 that are also in the composite list are removed from the composite list. Next, any privacy protection exemptions in the blacklist 18 that are not already on the composite list are added to the composite list. The composite list is then used as a master list of privacy protection criteria to be used to protect the client.
As shown in
Referring again to
Two distinct algorithms are employed to implement the present invention. A “quick update algorithm” is used to synchronize the local copy of the watch list 14 with the watch list 12 stored on the privacy server 10. A “privacy scanning algorithm” is used to implement the privacy protection criteria included in the composite list. The privacy scanning algorithm detects unwanted cookie files and scrubs them from the client machine 20.
The quick update algorithm will now be described. The client machine user subscribes to the service provider in order to receive the local copy of the watch list 14. If authentication is being used, when the client machine 20 connects to the server 10, authentication is performed to ensure that the client machine user is registered to receive watch list updates. If the user is properly registered, after authentication, an updated watch list is distributed to the client machine 20. If the user does not pass authentication, the update is not distributed. The service provider determines whether or not the quick update algorithm may be utilized with or without authentication.
Referring now to
In addition to using a combination of a watch list, a trustlist and a blacklist to create a composite list for detecting unwanted cookie files on a client machine, a software application running on the client machine 20 in accordance with the present invention may provide further functionality to the user. This functionality may include the ability for the client machine user to manually launch the privacy scan, to manually retrieve the latest watch list from the server 10, to customize the trustlist and blacklist, to view client cookie files, to select and manually delete cookie files, and to enable/disable privacy scanning.
The present invention is capable of running on any hardware configuration that is used as part of today's technology. In order to retrieve the latest watch list and update the composite list used by the present invention, the client machine software must be able to connect to an HTTP server.
The present invention is capable of working with any computer operating system. However, in today's modem marketplace, Microsoft Windows is the most commonly used computer operating system. Therefore, the present invention may be used with the Microsoft Windows operating system in the following versions: Windows 95, Windows 98, Windows Me, Windows NT and Windows 2000. In order to subscribe to the distributed watch list using the present invention's quick update functionality, the client machine software must have connectivity to the Internet.
The present invention may be implemented with any combination of hardware and software. The present invention can be included in an article of manufacture (e.g., one or more computer program products) having, for instance, computer useable media. The media has embodied therein, for instance, computer readable program code means for providing and facilitating the mechanisms of the present invention. The article of manufacture can be included as part of a computer system or sold separately.
It will be appreciated by those skilled in the art that changes could be made to the embodiments described above without departing from the broad inventive concept thereof. It is understood, therefore, that this invention is not limited to the particular embodiments disclosed, but it is intended to cover modifications within the spirit and scope of the present invention as defined by the appended claims.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US5706507||Jul 5, 1995||Jan 6, 1998||International Business Machines Corporation||System and method for controlling access to data located on a content server|
|US5740549||Jun 12, 1995||Apr 14, 1998||Pointcast, Inc.||Information and advertising distribution system and method|
|US5774670 *||Oct 6, 1995||Jun 30, 1998||Netscape Communications Corporation||Persistent client state in a hypertext transfer protocol based client-server system|
|US5826242 *||Aug 27, 1997||Oct 20, 1998||Netscape Communications Corporation||Method of on-line shopping utilizing persistent client state in a hypertext transfer protocol based client-server system|
|US5864848 *||Jan 31, 1997||Jan 26, 1999||Microsoft Corporation||Goal-driven information interpretation and extraction system|
|US5974429||Sep 3, 1997||Oct 26, 1999||Northern Telecom Limited||Method and apparatus for updating distributed databases in a telecommunications network|
|US5991878 *||Sep 8, 1997||Nov 23, 1999||Fmr Corp.||Controlling access to information|
|US6006334 *||May 1, 1997||Dec 21, 1999||International Business Machines Corp.||Method and system for authentication over a distributed service to limit password compromise|
|US6023723 *||Dec 22, 1997||Feb 8, 2000||Accepted Marketing, Inc.||Method and system for filtering unwanted junk e-mail utilizing a plurality of filtering mechanisms|
|US6085224 *||Mar 11, 1997||Jul 4, 2000||Intracept, Inc.||Method and system for responding to hidden data and programs in a datastream|
|US6092194 *||Nov 6, 1997||Jul 18, 2000||Finjan Software, Ltd.||System and method for protecting a computer and a network from hostile downloadables|
|US6237033 *||Jan 13, 1999||May 22, 2001||Pitney Bowes Inc.||System for managing user-characterizing network protocol headers|
|US6282709 *||Nov 12, 1997||Aug 28, 2001||Philips Electronics North America Corporation||Software update manager|
|US6286001 *||Feb 24, 1999||Sep 4, 2001||Doodlebug Online, Inc.||System and method for authorizing access to data on content servers in a distributed network|
|US6651217 *||Sep 1, 1999||Nov 18, 2003||Microsoft Corporation||System and method for populating forms with previously used data values|
|US6678731 *||Jul 8, 1999||Jan 13, 2004||Microsoft Corporation||Controlling access to a network server using an authentication ticket|
|US6851060 *||Jul 15, 1999||Feb 1, 2005||International Business Machines Corporation||User control of web browser user data|
|US20010049620 *||Feb 28, 2001||Dec 6, 2001||Blasko John P.||Privacy-protected targeting system|
|US20020019941 *||Jun 12, 1998||Feb 14, 2002||Shannon Chan||Method and system for secure running of untrusted content|
|US20020055912 *||Oct 19, 2001||May 9, 2002||Byron Buck||Network and method for facilitating on-line privacy|
|US20020078177 *||Dec 18, 2000||Jun 20, 2002||International Business Machines Corporation||System and method for maintaining state information on a client|
|US20020078191 *||Dec 20, 2000||Jun 20, 2002||Todd Lorenz||User tracking in a Web session spanning multiple Web resources without need to modify user-side hardware or software or to store cookies at user-side hardware|
|US20040230820 *||Feb 22, 2001||Nov 18, 2004||Hui Hsu Stephen Dao||Method and apparatus for encrypted communications to a secure server|
|1||"Cookie Crusher Controls Web Cookies," printout from web site address: http://www.thelimitsoft.com/cookie.html, printout date: Apr. 19, 2000 (2 pages).|
|2||"Cookie Pal," printout from web site address: http://www.kburra.com/cpal.html, printout date: Mar. 19, 2000 (4 pages).|
|3||"Cookie Software (PC)," printout from web site address: http://www.cookiecentral.com/files.htm, printout date: Mar. 21, 2000 (4 pages).|
|4||"Webroot's Window Washer," printout from web site address: http://www.webroot.com/washer.htm, printout date: Apr. 19, 2000 (5 pages).|
|5||*||Attachment 1: Ascentive website as of Feb. 29, 2000 showing Ascentive products.|
|6||*||Attachment 2: Waybackmachine search of Ascentive website.|
|7||Cookie Cruncher Home Page, "Cookie Cruncher," printout from web site address: http://www.rbaworld.com/Programs/CookieCruncher, printout date: Mar. 19, 2000 (2 pages).|
|8||Junkbusters, "Alert on Web Privacy," printout from web site address: http://www.junkbusters.com/cgi-bin/privacy, printout date: Mar. 21, 2000 (2 pages).|
|9||Junkbusters, "How Web Servers' Cookies Threaten Your Privacy," printout from web site address: http://www.junkbusters.com/ht/en/cookies.html, printout date: Mar. 21, 2000 (5 pages).|
|10||*||Norton Internet Security 2000-Review by Julien Jay.|
|11||PCWORLD.com, Software Utilities, "Cookie Manager," printout from web site address: http://www.pcworld.com/top400/article/0,1361,15771+1+1,00.html, printout date: Apr. 19, 2000 (3 pages).|
|12||*||Symantec Bundles Safe Surfing Tools-by Alexandra Krasne.|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US8631045||Oct 25, 2011||Jan 14, 2014||Ascentive Llc||System and method for network administration and local administration of privacy protection criteria|
|US8732515 *||Aug 11, 2011||May 20, 2014||Phillip M. Adams||Counter-invasive software system and method|
|US8819817||May 25, 2011||Aug 26, 2014||Apple Inc.||Methods and apparatus for blocking usage tracking|
|US20120030763 *||Feb 2, 2012||Adams Phillip M||Counter-invasive software system and method|
|U.S. Classification||1/1, 707/999.01|
|International Classification||G06F21/00, G06F17/30|
|Mar 28, 2001||AS||Assignment|
Owner name: ASCENTIVE LLC, PENNSYLVANIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SCHRAN, ADAM R.;DARLINGTON, ROBERT E.;REEL/FRAME:011662/0557
Effective date: 20010327
|Oct 5, 2010||CC||Certificate of correction|
|Feb 11, 2013||FPAY||Fee payment|
Year of fee payment: 4